Jesus' Coming Back

Twitter: Israel, Iran may have accessed users’ phone numbers

Twitter said Tuesday morning that Israel and Iran may have each accessed users’ phone numbers associated with their Twitter accounts. The social media giant said it had discovered attempts by possible state actors to access the phone numbers, after a security researcher unearthed a flaw in the company’s “contacts upload” feature. In a statement published on its privacy blog, Twitter said it had identified a “high volume of requests” to use the feature coming from IP addresses in Iran, Israel and Malaysia. There was no implication that the countries acted together as much as that each country separately exploited the same flaw. Twitter said, without elaborating, that “some of these IP addresses may have ties to state-sponsored actors.” The Jerusalem Post has learned that certain former Israeli intelligence agents have learned ways to gain backdoor access to various forms of social media platforms. Entities associated with some of these former agents may have used this backdoor access in a variety of ways, sometimes including influence campaigns. The Post cannot determine whether the former agents learned or used the techniques when they were still working for Israeli intelligence, but there have been a wide number of reports that top intelligence agencies, including US agencies, are sometimes able to use such techniques. Besides brute hacking of social media platforms, it is well-known that Russia, Iran and others use Twitter, Facebook and other networks to promote influence campaigns even without needing to hack other real users. Their tactics have included using “bots,” account which pose as people but are actually computer-generated, fictitious accounts or advertisement buys using fictitious identities to hide their often anti-Western agenda. A Twitter spokeswoman declined to say how many user phone numbers had been exposed, saying Twitter was unable to identify all of the accounts that may have been impacted. She said Twitter suspected a possible connection to state-backed actors because the attackers in Iran appeared to have had unrestricted access to Twitter, even though the network is banned there. Tech publication TechCrunch reported in Reuters on December 24 that a security researcher, Ibrahim Balic, had managed to match 17 million phone numbers to specific Twitter user accounts by exploiting a flaw in the contacts feature of its Android app. TechCrunch said it was able to identify a senior Israeli politician by matching a phone number through the tool. The feature, which allows people with a user’s phone number to find and connect with that user on Twitter, is off by default for users in the European Union where stringent privacy rules are in place. It is switched on by default for all other users globally, the spokeswoman said.
Source

Comments are closed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More